fvp_io_storage.c 6.48 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
/*
 * Copyright (c) 2014, ARM Limited and Contributors. All rights reserved.
 *
 * Redistribution and use in source and binary forms, with or without
 * modification, are permitted provided that the following conditions are met:
 *
 * Redistributions of source code must retain the above copyright notice, this
 * list of conditions and the following disclaimer.
 *
 * Redistributions in binary form must reproduce the above copyright notice,
 * this list of conditions and the following disclaimer in the documentation
 * and/or other materials provided with the distribution.
 *
 * Neither the name of ARM nor the names of its contributors may be used
 * to endorse or promote products derived from this software without specific
 * prior written permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 * POSSIBILITY OF SUCH DAMAGE.
 */

#include <assert.h>
32
#include <debug.h>
33
34
35
#include <io_driver.h>
#include <io_fip.h>
#include <io_memmap.h>
36
37
#include <io_storage.h>
#include <io_semihosting.h>
38
#include <platform_def.h>
39
40
#include <semihosting.h>	/* For FOPEN_MODE_... */
#include <string.h>
41
42

/* IO devices */
43
44
45
46
47
48
49
50
51
52
53
54
55
static const io_dev_connector_t *sh_dev_con;
static uintptr_t sh_dev_spec;
static uintptr_t sh_init_params;
static uintptr_t sh_dev_handle;
static const io_dev_connector_t *fip_dev_con;
static uintptr_t fip_dev_spec;
static uintptr_t fip_dev_handle;
static const io_dev_connector_t *memmap_dev_con;
static uintptr_t memmap_dev_spec;
static uintptr_t memmap_init_params;
static uintptr_t memmap_dev_handle;

static const io_block_spec_t fip_block_spec = {
56
57
58
	.offset = FLASH0_BASE,
	.length = FLASH0_SIZE
};
59

60
static const io_file_spec_t bl2_file_spec = {
61
	.path = BL2_IMAGE_NAME,
62
	.mode = FOPEN_MODE_RB
63
64
};

65
static const io_file_spec_t bl31_file_spec = {
66
	.path = BL31_IMAGE_NAME,
67
	.mode = FOPEN_MODE_RB
68
69
};

70
static const io_file_spec_t bl32_file_spec = {
71
	.path = BL32_IMAGE_NAME,
72
	.mode = FOPEN_MODE_RB
73
74
};

75
static const io_file_spec_t bl33_file_spec = {
76
	.path = BL33_IMAGE_NAME,
77
	.mode = FOPEN_MODE_RB
78
79
};

80
81
82
83
84
85
86
#if TRUSTED_BOARD_BOOT
static const io_file_spec_t bl2_cert_file_spec = {
	.path = BL2_CERT_NAME,
	.mode = FOPEN_MODE_RB
};
#endif /* TRUSTED_BOARD_BOOT */

87
88
static int open_fip(const uintptr_t spec);
static int open_memmap(const uintptr_t spec);
89
90
91

struct plat_io_policy {
	char *image_name;
92
93
94
	uintptr_t *dev_handle;
	uintptr_t image_spec;
	int (*check)(const uintptr_t spec);
95
96
};

97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
static const struct plat_io_policy policies[] = {
	{
		FIP_IMAGE_NAME,
		&memmap_dev_handle,
		(uintptr_t)&fip_block_spec,
		open_memmap
	}, {
		BL2_IMAGE_NAME,
		&fip_dev_handle,
		(uintptr_t)&bl2_file_spec,
		open_fip
	}, {
		BL31_IMAGE_NAME,
		&fip_dev_handle,
		(uintptr_t)&bl31_file_spec,
		open_fip
	}, {
		BL32_IMAGE_NAME,
		&fip_dev_handle,
		(uintptr_t)&bl32_file_spec,
		open_fip
	}, {
		BL33_IMAGE_NAME,
		&fip_dev_handle,
		(uintptr_t)&bl33_file_spec,
		open_fip
	}, {
124
125
126
127
128
129
130
#if TRUSTED_BOARD_BOOT
		BL2_CERT_NAME,
		&fip_dev_handle,
		(uintptr_t)&bl2_cert_file_spec,
		open_fip
	}, {
#endif /* TRUSTED_BOARD_BOOT */
131
132
		0, 0, 0
	}
133
134
135
};


136
static int open_fip(const uintptr_t spec)
137
138
139
140
{
	int result = IO_FAIL;

	/* See if a Firmware Image Package is available */
141
	result = io_dev_init(fip_dev_handle, (uintptr_t)FIP_IMAGE_NAME);
142
	if (result == IO_SUCCESS) {
Dan Handley's avatar
Dan Handley committed
143
		VERBOSE("Using FIP\n");
144
145
146
147
148
149
		/*TODO: Check image defined in spec is present in FIP. */
	}
	return result;
}


150
static int open_memmap(const uintptr_t spec)
151
152
{
	int result = IO_FAIL;
153
	uintptr_t local_image_handle;
154
155
156
157
158

	result = io_dev_init(memmap_dev_handle, memmap_init_params);
	if (result == IO_SUCCESS) {
		result = io_open(memmap_dev_handle, spec, &local_image_handle);
		if (result == IO_SUCCESS) {
Dan Handley's avatar
Dan Handley committed
159
			VERBOSE("Using Memmap IO\n");
160
161
162
163
164
165
166
			io_close(local_image_handle);
		}
	}
	return result;
}


167
static int open_semihosting(const uintptr_t spec)
168
169
{
	int result = IO_FAIL;
170
	uintptr_t local_image_handle;
171
172
173
174
175
176

	/* See if the file exists on semi-hosting.*/
	result = io_dev_init(sh_dev_handle, sh_init_params);
	if (result == IO_SUCCESS) {
		result = io_open(sh_dev_handle, spec, &local_image_handle);
		if (result == IO_SUCCESS) {
Dan Handley's avatar
Dan Handley committed
177
			VERBOSE("Using Semi-hosting IO\n");
178
179
180
181
182
183
			io_close(local_image_handle);
		}
	}
	return result;
}

184
void fvp_io_setup (void)
185
186
187
188
189
190
191
192
193
194
195
{
	int io_result = IO_FAIL;

	/* Register the IO devices on this platform */
	io_result = register_io_dev_sh(&sh_dev_con);
	assert(io_result == IO_SUCCESS);

	io_result = register_io_dev_fip(&fip_dev_con);
	assert(io_result == IO_SUCCESS);

	io_result = register_io_dev_memmap(&memmap_dev_con);
196
197
	assert(io_result == IO_SUCCESS);

198
	/* Open connections to devices and cache the handles */
199
200
201
	io_result = io_dev_open(sh_dev_con, sh_dev_spec, &sh_dev_handle);
	assert(io_result == IO_SUCCESS);

202
203
204
205
206
207
208
	io_result = io_dev_open(fip_dev_con, fip_dev_spec, &fip_dev_handle);
	assert(io_result == IO_SUCCESS);

	io_result = io_dev_open(memmap_dev_con, memmap_dev_spec,
				&memmap_dev_handle);
	assert(io_result == IO_SUCCESS);

209
210
211
212
213
214
	/* Ignore improbable errors in release builds */
	(void)io_result;
}


/* Return an IO device handle and specification which can be used to access
215
 * an image. Use this to enforce platform load policy */
216
217
int plat_get_image_source(const char *image_name, uintptr_t *dev_handle,
			  uintptr_t *image_spec)
218
219
{
	int result = IO_FAIL;
220
	const struct plat_io_policy *policy;
221
222
223
224
225
226
227
228

	if ((image_name != NULL) && (dev_handle != NULL) &&
	    (image_spec != NULL)) {
		policy = policies;
		while (policy->image_name != NULL) {
			if (strcmp(policy->image_name, image_name) == 0) {
				result = policy->check(policy->image_spec);
				if (result == IO_SUCCESS) {
229
					*image_spec = policy->image_spec;
230
231
232
233
234
235
236
					*dev_handle = *(policy->dev_handle);
					break;
				} else {
					result = open_semihosting(
							policy->image_spec);
					if (result == IO_SUCCESS) {
						*dev_handle = sh_dev_handle;
237
						*image_spec =
238
239
240
241
242
							policy->image_spec;
					}
				}
			}
			policy++;
243
		}
244
245
	} else {
		result = IO_FAIL;
246
	}
247
248
	return result;
}